Sciweavers

12637 search results - page 2435 / 2528
» Security for Extensible Systems
Sort
View
124
Voted
ICML
2009
IEEE
16 years 4 months ago
Graph construction and b-matching for semi-supervised learning
Graph based semi-supervised learning (SSL) methods play an increasingly important role in practical machine learning systems. A crucial step in graph based SSL methods is the conv...
Tony Jebara, Jun Wang, Shih-Fu Chang
227
Voted
ICDT
2009
ACM
175views Database» more  ICDT 2009»
16 years 4 months ago
Structural characterizations of schema-mapping languages
Schema mappings are declarative specifications that describe the relationship between two database schemas. In recent years, there has been an extensive study of schema mappings a...
Balder ten Cate, Phokion G. Kolaitis
WWW
2009
ACM
16 years 4 months ago
Computers and iphones and mobile phones, oh my!: a logs-based comparison of search users on different devices
We present a logs-based comparison of search patterns across three platforms: computers, iPhones and conventional mobile phones. Our goal is to understand how mobile search users ...
Maryam Kamvar, Melanie Kellar, Rajan Patel, Ya Xu
129
Voted
WWW
2009
ACM
16 years 4 months ago
XQuery in the browser
Since the invention of the Web, the browser has become more and more powerful. By now, it is a programming and execution environment in itself. The predominant language to program...
Ghislain Fourny, Markus Pilman, Daniela Florescu, ...
135
Voted
WWW
2008
ACM
16 years 4 months ago
Online auctions efficiency: a survey of ebay auctions
Online auctions have become a pervasive transaction mechanism for e-commerce. As the largest online marketplace in the world, eBay is an attractive case study that enables the stu...
Wenyan Hu, Alvaro Bolivar
« Prev « First page 2435 / 2528 Last » Next »